Connecting Technology and Business.

The cloud offers many security benefits to
organizations, but also raises new security considerations. It can also add to
existing ones such as shadow IT, the use of software that is not formally
sanctioned by the organization. Office 365 Advanced Security Management,
a new set of capabilities powered by Microsoft Cloud App Security gives you greater visibility and control over your
Office 365 environment.

Discovery and insights - Get enhanced visibility into your Office 365 usage and shadow IT
without installing an end point agent.

Threat Detection

Advanced Security Management enables you to
set up anomaly detection policies, so you can be alerted to potential
breaches of your network. Anomaly detection works by scanning user
activities and evaluating their risk against over 70 different indicators,
including sign-in failures, administrator activity and inactive accounts. For
example, you can be alerted to impossible travel scenarios, such as if a user
signs in to the service to check their mail from New York and then two minutes
later is downloading a document from SharePoint Online in Tokyo.

Advanced Security Management also leverages
behavioral analytics as part of its anomaly detection to assess
potentially risky user behavior. It does this by understanding how users
typically interact with Office 365, spotting anomalies and giving the anomalous
activity a risk score to help IT decide whether to take further action.

Enhanced Control

Advanced Security Management lets you set
up activity policies that can track specific activities. With
out-of-the-box templates, IT can easily create policies that flag when someone
is downloading an unusually large amount of data, has multiple failed sign-in
attempts or signs in from a risky IP address. Policies can also be customized
to your environment. Using activity filters, IT can look for the location of a
user, device type, IP address or if someone is granted admin rights. Alerts can
be created to notify an IT lead immediately via email or text message.

Default activity policy templates that
are included:

Administrative activity from
a non-administrative IP address Alert when an admin
user performs an administrative activity from an IP address that is not
included in a specific IP range category.

User logon from a
non-categorized IP address Alert when a user logs
on from an IP address that is not included in a specific IP range category.

Mass download by a single
user Alert when a single user performs more than 30
downloads within 5 minutes.

Multiple failed user log on
attempts to an app Alert when a single user
attempts to log on to a single app, and fails more than 10 times within 5
minutes.

Logon from a risky IP
address Alert when a user logs on from a risky IP
address to your sanctioned services. The Risky IP category contains, by
default, anonymous proxies and TOR exits point.

After reviewing an alert and investigating
a user’s activities, IT may deem that the behavior is risky and want to stop
the user from doing anything else. This can be done directly from the alert.
Some activities may be deemed so risky that IT may want to immediately suspend
the account. To help with this, IT can configure the activity policy so that an
account is automatically suspended if that risky activity takes place.

Advanced Security Management also shows
which apps are connected to Office 365 in their environment, who is using
them and the permissions they have. For example, if a user grants a scheduling
application access to their Office 365 calendar data, IT will be able to see
the details of the connection and revoke that application’s permissions with
one click if they deem it a security risk.

Discovery and Insights

Advanced Security Management also provides
an app discovery dashboard that allows IT Pros to visualize your
organization’s usage of Office 365 and other productivity cloud services, so
you can maximize investments in IT-approved solutions. With the ability to
discover about 1,000 applications in categories like collaboration, cloud
storage, webmail and others, IT can better determine the extent to which shadow
IT is occurring in your organization. Advanced Security Management will also
give you details about the top apps in each category. For example, you can see
how much data is being sent to OneDrive for Business, Box, Dropbox and other
cloud storage providers.

You can do all this without installing
anything on device end points. To load the data into the dashboard, all you
have to do is take the logs from your network devices and upload them via an
easy-to-use interface.

Many organizations allow users to connect
apps to Office 365 without IT intervention to help them be more productive. The
challenge is that it reduces the visibility and control that IT has over what
apps are doing with the data. App Permissions as part of Office 365
Advanced Security Management can help mitigate that risk.

App Permissions provides information to IT
about which applications in their network have access to Office 365 data, what
permissions they have and which users granted these apps access to their Office
365 accounts.

Based on this information, IT admins can
choose to approve the app or revoke its access to Office 365. If they choose to
revoke permissions to the app, it will no longer be able to access the
information for any of the users in the Office 365 tenant. App Permissions also
makes it easy for IT admins to notify users who have installed the application
that is going to be banned.

Office 365 Videos is an intranet website
portal where people in your organization can post and view videos. It's a
streaming video service for your organization that's available with SharePoint
Online in Office 365. It's a great place to share videos of executive
communications or recordings of classes, meetings, presentations, or training
sessions.

You can have channels for particular subjects, for example, or for specific groups such as departments or teams

You see only the channels that you have permission to view

Uploading videos

To upload a video, you upload it to a specific channel.

You can upload multiple videos to a channel at the same time.

Anyone in your organization who has edit permission for a particular channel can upload videos to it

Editing information about a video

Providing information about a video will make it easier for other people to find it through search, and will provide additional context for it in Delve and the Office Graph.

You have to have owner or editor permission for the channel that the video is in

Owner and people metadata

Office 365 Video also shows who uploaded the video and the various people who are in the video.

This enhances the discoverability of the video and highlights the main speakers; it, too, enhances when and how your videos appear in other users’ Delve activity feeds pivoting off of the relevant context of who knows who

Changing a thumbnail for a video

After a video you've uploaded
to Office 365 Video has been processed and is ready to play, you can add a
custom thumbnail for the video or you can choose from one of the auto-generated
thumbnails provided.

Add subtitles or captions

Subtitles or captions are lines of text that appear at the bottom of a video and provide a transcript of the audio portion of the video

You can add subtitles or captions to any video by uploading one or more subtitle or caption files

Enhance HR practices. Reduce cost and initial training cycles for new employees by
creating a designated group with the onboarding resources they need, while
giving them access to subject matter experts across the organization.

Extend the reach of IT. Speed end-user adoption by sharing tips and tricks for new
products. Enable self-help, access to peer expertise, and a searchable
knowledge base to reduce total time to problem resolution.

Transform Your HR Organization

An engaged workforce means good things for
your company’s HR and Corporate Communications Organizations. With Yammer,
employees feel empowered to make a difference by contributing to recruiting
efforts, recognizing peer performance, and learning from experts throughout the
company or industry. Yammer increases employee engagement by giving every team
member a voice and the tools and information to do more.

Onboard new hires quickly. Enable new hires to ramp up faster and continue to develop their
skills over time as they learn from their peers.

Recognize top talent. Identify high performers and publicly recognize employees who do
great work - increasing engagement, satisfaction, and retention.

Gain insight into
performance. Keep up to date with what your team is
working on and the progress made.

Start a company dialogue. Connect with your coworkers and encourage two-way dialogues in order
to improve communication among teams, employees, managers, and executives.

Give employees a voice. Spark creativity and innovation by allowing all employees to share
ideas, offer feedback and help drive business results.

Transform Your Marketing Organization

Collaboration across teams and with
customers is critical to your organization’s marketing success. With Yammer,
you can engage with agencies to build high-impact campaigns across geographies,
share customer insights, and drive refined go-to market strategies. You can
also improve execution through real-time collaboration of collateral. Empower
your employees to become brand ambassadors and strengthen your competitive
position with Yammer.

Centralize information. Create one
workspace where designated teams can sync up and get projects done.

Accelerate collateral
development. Develop quality collateral much faster
and in real-time with colleagues, ensuring that the salesforce is always
equipped with the latest materials.

Create brand ambassadors. Easily ensure employees and partners are aligned with company
messaging and positioning.

Empower Your Sales Organization

Finding the right information at the right
time is critical to the success of your sales team. With Yammer, sales
representatives can tap into the collective knowledge of your organization to
close deals quickly and increase customer retention. Empower your teams to
instantly access expertise and information, gain a competitive advantage, and
secure deals faster.

Access and share key
information. Quickly distribute the latest key
messaging out to the entire field.

When you attach a
file in a cloud location such as OneDrive or SharePoint, Outlook will send your
recipients a link to the file. Permission to access the file is granted
automatically to every recipient. This makes collaboration easy because you
don't have to worry about attachments being dropped, and you can be sure that
everyone is collaborating on the same (and most up-to-date) version of the
file.

In Outlook, create a message.

Note: For an existing
message, click Reply, Reply All, or Forward.

On the ribbon, click Attach
File, and choose Browse Web Locations.

Choose OneDrive,
the file you want to attach, and then choose Insert.

In your email message,
choose the down arrow for the attachment.

Choose Change
Permissions, and then choose one of the following:

Recipients can Edit if you want
recipients to be able to modify the file.

Recipients can View, the default option,
if you want recipients to be able to read, but not modify, the file.